Abstracts. Cryptography, Cyber Security and Information Warfare. (3rd CryCybIW) 3 rd International Conference on. Hellenic Military Academy

Size: px
Start display at page:

Download "Abstracts. Cryptography, Cyber Security and Information Warfare. (3rd CryCybIW) 3 rd International Conference on. Hellenic Military Academy"

Transcription

1 3 rd International Conference on Cryptography, Cyber Security and Information Warfare (3rd CryCybIW) 26 th -27 th May 2016 Abstracts Editor: Nicholas J. Daras

2 2

3 Cryptographic Techniques for Secure Linear Computations in the Supply Chain Management Iris-Pandora Krommyda 1, Gerasimos C. Meletiou 2, Demetrius S. Triantafyllou 3 and Michael N. Vrahatis 4 1 Department of Business Administration of Food and Agricultural Enterprises, University of Western Greece, GR Agrinio, Greece, ikrommyd@cc.uoi.gr 2 A.T.E.I. of Epirus, P.O.110, GR Arta, Greece, gmelet@teiep.gr 3 Department of Mathematics and Engineering Sciences,, Vari, GR-16673, Greece dtriant@math.uoa.gr 4 Computational Intelligence Laboratory, Department of Mathematics, University of Patras, GR Patras, Greece, vrahatis@math.upatras.gr 4 Key words: supply chain management optimization linear programming secure linear computations Abstract Optimization problems encountered in a supply chain can often be modeled as linear programming problems, whose objective function and constraints combine data from several parties. However, this approach requires private data and sensitive information that the involved parties are often unwilling and hesitant to exchange and reveal to each other. In order to tackle these two conflicting goals, namely, the information sharing and protecting confidentiality, various cryptographic techniques for secure linear computations have been developed. These techniques ensure that the several parties can compute any function without any party to disclose its input to another. An overview of various efficient techniques for securely solving linear programming problems is presented. 144

4 References [1] B. Boutsinas, G.C. Meletiou and M.N. Vrahatis: Mining encrypted data, in Supply Chain and Finance, P.M. Pardalos, A. Migdalas and G. Baourakis (eds.), Chapter 16, pp , World Scientific Publishing (Computers and Operations Research series, vol. 2), River Edge, NJ, U.S.A., 2004 [2] O. Catrina and S. de Hoogh: Secure multiparty linear programming using fixedpoint arithmetic, Lecture Notes in Computer Science 6345(2010), pp [3] R. Cramer and I. Damgård: Secure distributed linear algebra in a constant number of rounds, Lecture Notes in Computer Science 2139(2001), pp [4] Y. Hong and J. Vaidya: An inference-proof approach to privacy-preserving horizontally partitioned linear programs, Optimization Letters 8(1)(2014), pp [5] Y. Hong and J. Vaidya and H.-B. Lu: Secure and efficient distributed linear programming, Journal of Computer Security 20(2012), pp [6] Y. Hong and J. Vaidya and S. Wang: A survey of privacy-aware supply chain collaboration: From theory to applications, Journal of Information Systems 28(1)(2014), pp [7] M.G. Karagiannopoulos, M.N. Vrahatis and G.C. Meletiou: A note on a secure voting system on a public network, Networks 432(4)(2004), pp [8] E. Kiltz, P. Mohassel, E. Weinreb and M. Franklin: Secure linear algebra using linearly recurrent sequences, Lecture Notes in Computer Science 4392(2007), pp [9] E. C. Laskari, G.C. Meletiou, D.K. Tasoulis and M.N. Vrahatis: Privacy preserving electronic data gathering, Mathematical and Computer Modelling 42(7-8)(2005), pp [10] E. C. Laskari, G.C. Meletiou and M.N. Vrahatis: Recent approaches to electronic data gathering with privacy, in Proceedings of the First International Conference From Scientific Computing to Computational Engineering (IC-SCCE 2004), September 8 10, 2004, Athens, Greece, pp.1 7, 2004 [11] J.-T. Li and M.J. Atallah: Secure and private collaborative linear programming, in Proceedings of the International Conference on Collaborative Computing: 145

5 Networking, Applications and Worksharing (CollaborateCom 2006), November 17 20, 2006, Atlanta, GA, U.S.A., pp.1 8, 2006 [12] O. L. Mangasarian: Privacy-preserving linear programming, Optimization Letters 5(1)(2011), pp [13] G.C. Meletiou, A.D. Koutsodimas and I.P. Krommyda: Secure supply chain collaboration using cryptographic techniques, in Proceedings of the 4th International Symposium and 26th National Conference on Operational Research, June 4 6, 2015, Chania, Greece, pp.68 72, 2015 [14] J. Vaidya: Privacy-preserving linear programming, Proceedings of the ACM symposium on Applied Computing (SAC 2009), March 8 2, 2009, Honolulu, HI, U.S.A., pp , 2009 [15] A.C.-C. Yao: How to generate and exchange secrets, in Proceedings of the 27th Annual Symposium on Foundations of Computer Science (SFCS 1986), October 27 29, 1986, Toronto, ON, Canada, pp ,

Is Privacy Still an Issue for Data Mining? Chris Clifton 11 October, 2007

Is Privacy Still an Issue for Data Mining? Chris Clifton 11 October, 2007 Is Privacy Still an Issue for Data Mining? Chris Clifton 11 October, 2007 Privacy-Preserving Data Mining: History 2000: First PPDM papers Srikant&Agrawal: Perturbation Lindell&Pinkas: Secure Multiparty

More information

MSc(CompSc) List of courses offered in

MSc(CompSc) List of courses offered in Office of the MSc Programme in Computer Science Department of Computer Science The University of Hong Kong Pokfulam Road, Hong Kong. Tel: (+852) 3917 1828 Fax: (+852) 2547 4442 Email: msccs@cs.hku.hk (The

More information

Privacy-Preserving Collaborative Recommendation Systems Based on the Scalar Product

Privacy-Preserving Collaborative Recommendation Systems Based on the Scalar Product Privacy-Preserving Collaborative Recommendation Systems Based on the Scalar Product Justin Zhan I-Cheng Wang Abstract In the e-commerce era, recommendation systems were introduced to share customer experience

More information

Note Computations with a deck of cards

Note Computations with a deck of cards Theoretical Computer Science 259 (2001) 671 678 www.elsevier.com/locate/tcs Note Computations with a deck of cards Anton Stiglic Zero-Knowledge Systems Inc, 888 de Maisonneuve East, 6th Floor, Montreal,

More information

Cryptography. Module in Autumn Term 2016 University of Birmingham. Lecturers: Mark D. Ryan and David Galindo

Cryptography. Module in Autumn Term 2016 University of Birmingham. Lecturers: Mark D. Ryan and David Galindo Lecturers: Mark D. Ryan and David Galindo. Cryptography 2017. Slide: 1 Cryptography Module in Autumn Term 2016 University of Birmingham Lecturers: Mark D. Ryan and David Galindo Slides originally written

More information

Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme

Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme Yandong Zheng 1, Hua Guo 1 1 State Key Laboratory of Software Development Environment, Beihang University Beiing

More information

Secure Multiparty Computations

Secure Multiparty Computations Secure Multiparty Computations CS 6750 Lecture 11 December 3, 2009 Riccardo Pucella The Last Few Lectures... Secret sharing: How to get two or more parties to share a secret in such a way that each individual

More information

Using One hot Residue Number System (OHRNS) for Digital Image Processing

Using One hot Residue Number System (OHRNS) for Digital Image Processing Using One hot Residue Number System (OHRNS) for Digital Image Processing Davar Kheirandish Taleshmekaeil*, Parviz Ghorbanzadeh**, Aitak Shaddeli***, and Nahid Kianpour**** *Department of Electronic and

More information

PAPER. Connecting the dots. Giovanna Roda Vienna, Austria

PAPER. Connecting the dots. Giovanna Roda Vienna, Austria PAPER Connecting the dots Giovanna Roda Vienna, Austria giovanna.roda@gmail.com Abstract Symbolic Computation is an area of computer science that after 20 years of initial research had its acme in the

More information

AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES. N. Askari, H.M. Heys, and C.R. Moloney

AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES. N. Askari, H.M. Heys, and C.R. Moloney 26TH ANNUAL IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING YEAR 2013 AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES N. Askari, H.M. Heys, and C.R. Moloney

More information

Topical Collection on Blockchain-based Medical Data Management System: Security and Privacy Challenges and Opportunities

Topical Collection on Blockchain-based Medical Data Management System: Security and Privacy Challenges and Opportunities Topical Collection on Blockchain-based Medical Data Management System: Security and Privacy Challenges and Opportunities Timely access to data, particularly data relevant to a patient s medical and genetic

More information

e-voting Scientific Events May 2004

e-voting Scientific Events May 2004 e-voting Scientific Events May 2004 Trademarks All brand names and product names are trademarks or registered trademarks of their respective owners. Disclaimer This document is provided as is without warranty

More information

Scientific Report. Dr. Dimitrios Simos Greek SBA Research Dr. Edgar Weippl. 01/03/2013 to 28/02/2015. First name / Family name

Scientific Report. Dr. Dimitrios Simos Greek SBA Research Dr. Edgar Weippl. 01/03/2013 to 28/02/2015. First name / Family name Scientific Report First name / Family name Nationality Name of the Host Organisation First Name / family name of the Scientific Coordinator Dr. Dimitrios Simos Greek SBA Research Dr. Edgar Weippl Period

More information

Hiding Image in Image by Five Modulus Method for Image Steganography

Hiding Image in Image by Five Modulus Method for Image Steganography Hiding Image in Image by Five Modulus Method for Image Steganography Firas A. Jassim Abstract This paper is to create a practical steganographic implementation to hide color image (stego) inside another

More information

IMPORTANT ASPECTS OF DATA MINING & DATA PRIVACY ISSUES. K.P Jayant, Research Scholar JJT University Rajasthan

IMPORTANT ASPECTS OF DATA MINING & DATA PRIVACY ISSUES. K.P Jayant, Research Scholar JJT University Rajasthan IMPORTANT ASPECTS OF DATA MINING & DATA PRIVACY ISSUES K.P Jayant, Research Scholar JJT University Rajasthan ABSTRACT It has made the world a smaller place and has opened up previously inaccessible markets

More information

Secure multiparty computation without one-way functions

Secure multiparty computation without one-way functions Secure multiparty computation without one-way functions Dima Grigoriev CNRS, Mathématiques, Université de Lille 59655, Villeneuve d Ascq, France dmitry.grigoryev@math.univ-lille1.fr Vladimir Shpilrain

More information

Assistant Professor, Department of Computer Science, RPI. Research Fellow, Simons Institute for the Theory of Computing, UC Berkeley.

Assistant Professor, Department of Computer Science, RPI. Research Fellow, Simons Institute for the Theory of Computing, UC Berkeley. Curriculum Vitae Vassilis Zikas Assistant Professor, RPI Rensselaer Polytechnic Institute Department of Computer Science Troy, NY 12180 cs.rpi.edu/~zikasv Education 2006 2010 PhD in Computer Science, Information

More information

Developing Investigation Skills in DLT: Bitcoin

Developing Investigation Skills in DLT: Bitcoin Developing Investigation Skills in DLT: Bitcoin Emerging technology investigations Sukhvinder Hara s.hara@mdx.ac.uk Providing Students with Skills to Investigate DLT Challenge for the audience 1. 1BsHJ7jErmkWqoSJNqPq72qMZzJ2wwKKNo

More information

Unlocking the blockchain

Unlocking the blockchain Financial institutions Energy Infrastructure, mining and commodities Transport Technology and innovation Life sciences and healthcare Unlocking the blockchain A global legal and regulatory guide Chapter

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK VISUAL CRYPTOGRAPHY FOR IMAGES MS. SHRADDHA SUBHASH GUPTA 1, DR. H. R. DESHMUKH

More information

PRIME FACTORISATION Lesson 1: Factor Strings

PRIME FACTORISATION Lesson 1: Factor Strings PRIME FACTORISATION Lesson 1: Factor Strings Australian Curriculum: Mathematics Year 7 ACMNA149: Investigate index notation and represent whole numbers as products of powers of prime numbers. Applying

More information

An Ontology for Modelling Security: The Tropos Approach

An Ontology for Modelling Security: The Tropos Approach An Ontology for Modelling Security: The Tropos Approach Haralambos Mouratidis 1, Paolo Giorgini 2, Gordon Manson 1 1 University of Sheffield, Computer Science Department, UK {haris, g.manson}@dcs.shef.ac.uk

More information

Crypto Art, Law and Blockchain

Crypto Art, Law and Blockchain Crypto Art, Law and Blockchain Professor Tonya M. Evans Chair, IP & Technology Online Programs Franklin Pierce Center for Intellectual Property, University of New Hampshire School of Law @IPProfEvans #EvansOnTheBlock

More information

DUBLIN CITY UNIVERSITY

DUBLIN CITY UNIVERSITY DUBLIN CITY UNIVERSITY SEMESTER ONE EXAMINATIONS 2013/2014 MODULE: CA642/A Cryptography and Number Theory PROGRAMME(S): MSSF MCM ECSA ECSAO MSc in Security & Forensic Computing M.Sc. in Computing Study

More information

Does exposure to university research matter to high-potential entrepreneurship?

Does exposure to university research matter to high-potential entrepreneurship? Does exposure to university research matter to high-potential entrepreneurship? AIMILIA PROTOGEROU, YANNIS CALOGHIROU, NICHOLAS S. VONORTAS LABORATORY OF INDUSTRIAL AND ENERGY ECONOMICS, NATIONAL TECHNICAL

More information

Computer Science & High Tech

Computer Science & High Tech ABCD Computer Science & High Tech yet are quickly accessible from one central location. 7 Gain a competitive advantage 7 Facilitate product research and development 7 Raise return on investment Computer

More information

Reviewing Multiple Secret Image Sharing Scheme based on Matrix Multiplication

Reviewing Multiple Secret Image Sharing Scheme based on Matrix Multiplication Reviewing Multiple Secret Image Sharing Scheme based on Matrix Multiplication Fereshte Sheikh Sang Tajan Massoud Hadian Dehkordi Abdolrasoul Mirghadri Faculty and Research Center of Communication and Information

More information

UX Aspects of Threat Information Sharing

UX Aspects of Threat Information Sharing UX Aspects of Threat Information Sharing Tomas Sander Hewlett Packard Laboratories February 25 th 2016 Starting point Human interaction still critically important at many stages of Threat Intelligence

More information

S Coding Methods (5 cr) P. Prerequisites. Literature (1) Contents

S Coding Methods (5 cr) P. Prerequisites. Literature (1) Contents S-72.3410 Introduction 1 S-72.3410 Introduction 3 S-72.3410 Coding Methods (5 cr) P Lectures: Mondays 9 12, room E110, and Wednesdays 9 12, hall S4 (on January 30th this lecture will be held in E111!)

More information

Implementation and Performance Testing of the SQUASH RFID Authentication Protocol

Implementation and Performance Testing of the SQUASH RFID Authentication Protocol Implementation and Performance Testing of the SQUASH RFID Authentication Protocol Philip Koshy, Justin Valentin and Xiaowen Zhang * Department of Computer Science College of n Island n Island, New York,

More information

Dependable AI Systems

Dependable AI Systems Dependable AI Systems Homa Alemzadeh University of Virginia In collaboration with: Kush Varshney, IBM Research 2 Artificial Intelligence An intelligent agent or system that perceives its environment and

More information

Beijing Institute of Technology B.Sc. in Management Information Systems June 2004 (Concentration in Operations Research; Minor in Computer Science)

Beijing Institute of Technology B.Sc. in Management Information Systems June 2004 (Concentration in Operations Research; Minor in Computer Science) Yuan Hong Contact Information Research Interests Education University at Albany, SUNY Office Phone: 518-442-3305 1400 Washington Ave., Albany, NY 12222 E-Mail: hong@albany.edu WWW: http://www.albany.edu/faculty/hong/

More information

Expectations for Intelligent Computing

Expectations for Intelligent Computing Fujitsu Laboratories of America Technology Symposium 2015 Expectations for Intelligent Computing Tango Matsumoto CTO & CIO FUJITSU LIMITED Outline What s going on with AI in Fujitsu? Where can we apply

More information

Technological Innovation : Open Innovation

Technological Innovation : Open Innovation Technological Innovation : Open Innovation 10 March 2015 What is open innovation? Open Innovation is a co-create innovation ecosystem: R&D Centers Entrepreneurs Customers Ecosystem Universities End Users

More information

Efficient Privacy-Preserving Biometric Identification

Efficient Privacy-Preserving Biometric Identification Efficient Privacy-Preserving Biometric Identification Yan Huang Lior Malka David Evans Jonathan Katz http://www.mightbeevil.org/secure-biometrics/ Feb 9, 2011 Motivating Scenario: Private No-Fly Checking

More information

What is Proof of Stake?

What is Proof of Stake? What is Proof of Stake? Educational Series September 20, 2018 History The proof-of-stake consensus mechanism was first suggested on the Bitcointalk forum in 2011, but was not formally introduced until

More information

MAT 302: ALGEBRAIC CRYPTOGRAPHY. Department of Mathematical and Computational Sciences University of Toronto, Mississauga.

MAT 302: ALGEBRAIC CRYPTOGRAPHY. Department of Mathematical and Computational Sciences University of Toronto, Mississauga. MAT 302: ALGEBRAIC CRYPTOGRAPHY Department of Mathematical and Computational Sciences University of Toronto, Mississauga February 27, 2013 Mid-term Exam INSTRUCTIONS: The duration of the exam is 100 minutes.

More information

Workshop on anonymization Berlin, March 19, Basic Knowledge Terms, Definitions and general techniques. Murat Sariyar TMF

Workshop on anonymization Berlin, March 19, Basic Knowledge Terms, Definitions and general techniques. Murat Sariyar TMF Workshop on anonymization Berlin, March 19, 2015 Basic Knowledge Terms, Definitions and general techniques Murat Sariyar TMF Workshop Anonymisation, March 19, 2015 Outline Background Aims of Anonymization

More information

A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME

A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME International Journal of Power Control Signal and Computation (IJPCSC) Vol. 2 No. 1 ISSN : 0976-268X A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME 1 P. Arunagiri, 2 B.Rajeswary, 3 S.Arunmozhi

More information

Juan Garay (Yahoo Labs) Clint Givens (Maine School of Science and Mathematics) Rafail Ostrovsky (UCLA) Pavel Raykov (ETH)

Juan Garay (Yahoo Labs) Clint Givens (Maine School of Science and Mathematics) Rafail Ostrovsky (UCLA) Pavel Raykov (ETH) Broadcast (and Round) Efficient Secure Multiparty Computation Juan Garay (Yahoo Labs) Clint Givens (Maine School of Science and Mathematics) Rafail Ostrovsky (UCLA) Pavel Raykov (ETH) Secure Multiparty

More information

Privacy as Impression Management

Privacy as Impression Management Institute for Software Research Privacy as Impression Management Sameer Patil patil@uci.edu Alfred Kobsa kobsa@ics.uci.edu ISR Technical Report # UCI-ISR-03-13 Institute for Software Research ICS2 210

More information

Patent Geography - Global Applications, Regional Protection

Patent Geography - Global Applications, Regional Protection Patent Geography - Global Applications, Regional Protection September 4, 2017 EPIP 12 th Annual Conference Yoshiaki Kodachi Japan Patent Office Outline of Japan Patent Office Speed 9.7 month (FY 2015)

More information

Keeping secrets secret

Keeping secrets secret Keeping s One of the most important concerns with using modern technology is how to keep your s. For instance, you wouldn t want anyone to intercept your emails and read them or to listen to your mobile

More information

Keywords Arnold transforms; chaotic logistic mapping; discrete wavelet transform; encryption; mean error.

Keywords Arnold transforms; chaotic logistic mapping; discrete wavelet transform; encryption; mean error. Volume 5, Issue 2, February 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Entropy

More information

Efficient Card-based Protocols for Generating a Hidden Random Permutation without Fixed Points

Efficient Card-based Protocols for Generating a Hidden Random Permutation without Fixed Points Efficient Card-based Protocols for Generating a Hidden Random Permutation without Fixed Points Rie Ishikawa 1, Eikoh Chida 1, and Takaaki Mizuki 2 1 Electrical and Computer Engineering, National Institute

More information

Instrumentation, Controls, and Automation - Program 68

Instrumentation, Controls, and Automation - Program 68 Instrumentation, Controls, and Automation - Program 68 Program Description Program Overview Utilities need to improve the capability to detect damage to plant equipment while preserving the focus of skilled

More information

Discovering Knowledge in Design and Manufacturing Repositories

Discovering Knowledge in Design and Manufacturing Repositories Discovering Knowledge in Design and Manufacturing Repositories William C. Regli Erik Hayes David McWherter Mitchell Peabody Cheryl Foster Yuriy Shapirsteyn Lisa Anthony Geometric and Intelligent Computing

More information

Card-Based Protocols for Securely Computing the Conjunction of Multiple Variables

Card-Based Protocols for Securely Computing the Conjunction of Multiple Variables Card-Based Protocols for Securely Computing the Conjunction of Multiple Variables Takaaki Mizuki Tohoku University tm-paper+cardconjweb[atmark]g-mailtohoku-universityjp Abstract Consider a deck of real

More information

ACADEMIC YEAR

ACADEMIC YEAR INTERNATIONAL JOURNAL SL.NO. NAME OF THE FACULTY TITLE OF THE PAPER JOURNAL DETAILS 1 Dr.K.Komathy 2 Dr.K.Komathy 3 Dr.K. Komathy 4 Dr.G.S.Anandha Mala 5 Dr.G.S.Anandha Mala 6 Dr.G.S.Anandha Mala 7 Dr.G.S.Anandha

More information

Webpage: Volume 4, Issue VI, June 2016 ISSN

Webpage:   Volume 4, Issue VI, June 2016 ISSN 4-P Secret Sharing Scheme Deepa Bajaj 1, Navneet Verma 2 1 Master s in Technology (Dept. of CSE), 2 Assistant Professr (Dept. of CSE) 1 er.deepabajaj@gmail.com, 2 navneetcse@geeta.edu.in Geeta Engineering

More information

Electronic Warfare Chair (CEDR) at the University of Pretoria

Electronic Warfare Chair (CEDR) at the University of Pretoria Electronic Warfare Chair (CEDR) at the University of Pretoria Prof. Warren du Plessis wduplessis@ieee.org Associate Professor Chair in Electronic Defence Research University of Pretoria 1 Overview What

More information

An Efficient Interception Mechanism Against Cheating In Visual Cryptography With Non Pixel Expansion Of Images

An Efficient Interception Mechanism Against Cheating In Visual Cryptography With Non Pixel Expansion Of Images An Efficient Interception Mechanism Against Cheating In Visual Cryptography With Non Pixel Expansion Of Images Linju P.S, Sophiya Mathews Abstract: Visual cryptography is a technique of cryptography in

More information

Some Cryptanalysis of the Block Cipher BCMPQ

Some Cryptanalysis of the Block Cipher BCMPQ Some Cryptanalysis of the Block Cipher BCMPQ V. Dimitrova, M. Kostadinoski, Z. Trajcheska, M. Petkovska and D. Buhov Faculty of Computer Science and Engineering Ss. Cyril and Methodius University, Skopje,

More information

Amigo Approach Towards Perceived Privacy

Amigo Approach Towards Perceived Privacy Amigo Approach Towards Perceived Privacy Maddy Janse, Peter Vink, Yeo LeeChin, and Abdullah Al Mahmud Philips Research, High Tech Campus 5, 5656 AE Eindhoven, The Netherlands Abstract. Perceived privacy,

More information

Overview maritime topics H2020 calls 1-2. October 23 rd 2013 M. Goldan

Overview maritime topics H2020 calls 1-2. October 23 rd 2013 M. Goldan Overview maritime topics H2020 calls 1-2 October 23 rd 2013 M. Goldan 1 SOURCES: H2020 Part II: Industrial leadership H2020 Part III: Societal Challenges: Nieuw: Marine/Maritime-relevant topics spread

More information

Asymptotically Optimal Two-Round Perfectly Secure Message Transmission

Asymptotically Optimal Two-Round Perfectly Secure Message Transmission Asymptotically Optimal Two-Round Perfectly Secure Message Transmission Saurabh Agarwal 1, Ronald Cramer 2 and Robbert de Haan 3 1 Basic Research in Computer Science (http://www.brics.dk), funded by Danish

More information

Moiré Cryptography. Yvo Desmedt. Tri Van Le. ABSTRACT 1. INTRODUCTION

Moiré Cryptography. Yvo Desmedt. Tri Van Le. ABSTRACT 1. INTRODUCTION Moiré Cryptography Yvo Desmedt Department of Computer Science PO Box 4530, Florida State University Tallahassee, FL 32306, USA, and Royal Holloway College University of London, UK. desmedt@cs.fsu.edu Tri

More information

Journal Title ISSN 5. MIS QUARTERLY BRIEFINGS IN BIOINFORMATICS

Journal Title ISSN 5. MIS QUARTERLY BRIEFINGS IN BIOINFORMATICS List of Journals with impact factors Date retrieved: 1 August 2009 Journal Title ISSN Impact Factor 5-Year Impact Factor 1. ACM SURVEYS 0360-0300 9.920 14.672 2. VLDB JOURNAL 1066-8888 6.800 9.164 3. IEEE

More information

Biometric Authentication for secure e-transactions: Research Opportunities and Trends

Biometric Authentication for secure e-transactions: Research Opportunities and Trends Biometric Authentication for secure e-transactions: Research Opportunities and Trends Fahad M. Al-Harby College of Computer and Information Security Naif Arab University for Security Sciences (NAUSS) fahad.alharby@nauss.edu.sa

More information

Operational Research: An International Journal

Operational Research: An International Journal Operational Research: An International Journal Special Issue on XIII Balkan Conference on Operational Research BALCOR 2018 Advanced Optimization Methods with Modern Applications Lead Guest Editor and Guest

More information

arxiv:cs/ v3 [cs.ds] 9 Jul 2003

arxiv:cs/ v3 [cs.ds] 9 Jul 2003 Permutation Generation: Two New Permutation Algorithms JIE GAO and DIANJUN WANG Tsinghua University, Beijing, China arxiv:cs/0306025v3 [cs.ds] 9 Jul 2003 Abstract. Two completely new algorithms for generating

More information

Cryptography Lecture 1: Remainders and Modular Arithmetic Spring 2014 Morgan Schreffler Office: POT 902

Cryptography Lecture 1: Remainders and Modular Arithmetic Spring 2014 Morgan Schreffler Office: POT 902 Cryptography Lecture 1: Remainders and Modular Arithmetic Spring 2014 Morgan Schreffler Office: POT 902 http://www.ms.uky.edu/~mschreffler Topic Idea: Cryptography Our next topic is something called Cryptography,

More information

R. K. Sharma School of Mathematics and Computer Applications Thapar University Patiala, Punjab, India

R. K. Sharma School of Mathematics and Computer Applications Thapar University Patiala, Punjab, India Segmentation of Touching Characters in Upper Zone in Printed Gurmukhi Script M. K. Jindal Department of Computer Science and Applications Panjab University Regional Centre Muktsar, Punjab, India +919814637188,

More information

CESEL: Flexible Crypto Acceleration. Kevin Kiningham Dan Boneh, Mark Horowitz, Philip Levis

CESEL: Flexible Crypto Acceleration. Kevin Kiningham Dan Boneh, Mark Horowitz, Philip Levis CESEL: Flexible Crypto Acceleration Kevin Kiningham Dan Boneh, Mark Horowitz, Philip Levis Cryptography Mathematical operations to secure data Fundamental for building secure systems Computationally intensive:

More information

Application: Public Key Cryptography. Public Key Cryptography

Application: Public Key Cryptography. Public Key Cryptography Application: Public Key Cryptography Suppose I wanted people to send me secret messages by snail mail Method 0. I send a padlock, that only I have the key to, to everyone who might want to send me a message.

More information

Information Security and Cryptography

Information Security and Cryptography Information Security and Cryptography Series Editors David Basin Kenny Paterson Advisory Board Michael Backes Gilles Barthe Ronald Cramer Ivan Damgård Andrew D. Gordon Joshua D. Guttman Christopher Kruegel

More information

Modernizing Disclosure Avoidance: Report on the 2020 Disclosure Avoidance Subsystem as Implemented for the 2018 End-to-End Test (Continued)

Modernizing Disclosure Avoidance: Report on the 2020 Disclosure Avoidance Subsystem as Implemented for the 2018 End-to-End Test (Continued) Modernizing Disclosure Avoidance: Report on the 2020 Disclosure Avoidance Subsystem as Implemented for the 2018 End-to-End Test (Continued) Simson L. Garfinkel Chief, Center for Disclosure Avoidance Research

More information

COMPUTABILITY OF DESIGN DIAGRAMS

COMPUTABILITY OF DESIGN DIAGRAMS COMPUTABILITY OF DESIGN DIAGRAMS an empirical study of diagram conventions in design ELLEN YI-LUEN DO College of Architecture, Georgia Institute of Technology, Atlanta, GA 30332-0155, U. S. A. ellendo@cc.gatech.edu

More information

Introduction to Computer Science - PLTW #9340

Introduction to Computer Science - PLTW #9340 Introduction to Computer Science - PLTW #9340 Description Designed to be the first computer science course for students who have never programmed before, Introduction to Computer Science (ICS) is an optional

More information

Abstract. 1 Introduction. 2 The Proposed Scheme. The 29th Workshop on Combinatorial Mathematics and Computation Theory

Abstract. 1 Introduction. 2 The Proposed Scheme. The 29th Workshop on Combinatorial Mathematics and Computation Theory The 29th Workshop on Combinatorial Mathematics and Computation Theory Visual Cryptography for Gray-level Image by Random Grids * Hui-Yu Hsu and Justie Su-Tzu Juan 1 Department of Computer Science and Information

More information

Meta-data based secret image sharing application for different sized biomedical

Meta-data based secret image sharing application for different sized biomedical Biomedical Research 2018; Special Issue: S394-S398 ISSN 0970-938X www.biomedres.info Meta-data based secret image sharing application for different sized biomedical images. Arunkumar S 1*, Subramaniyaswamy

More information

CANADIAN CENTRE FOR ETHICS AND CORPORATE POLICY. Annual General Meeting. May 17, :30 7:00 pm

CANADIAN CENTRE FOR ETHICS AND CORPORATE POLICY. Annual General Meeting. May 17, :30 7:00 pm CANADIAN CENTRE FOR ETHICS AND CORPORATE POLICY Annual General Meeting May 17, 2017 3:30 7:00 pm Action indeed is the sole medium of expression for ethics. Jane Adams Welcome Note Agenda We are firmly

More information

Unlinkability and Redundancy in Anonymous Publication Systems

Unlinkability and Redundancy in Anonymous Publication Systems Unlinkability and Redundancy in Anonymous Publication Systems Christian Boesgaard pink@diku.dk Department of Computer Science University of Copenhagen Denmark January 22, 2004 1 Introduction An anonymous

More information

Lecture Notes in Computer Science Edited by G. Goos, J. Hartmanis and J. van Leeuwen

Lecture Notes in Computer Science Edited by G. Goos, J. Hartmanis and J. van Leeuwen Lecture Notes in Computer Science 1528 Edited by G. Goos, J. Hartmanis and J. van Leeuwen 3 Berlin Heidelberg New York Barcelona Hong Kong London Milan Paris Singapore Tokyo Bart Preneel Vincent Rijmen

More information

Using One hot Residue (OHR) in Image Processing: Proposed a Scheme of Filtering in Spatial Domain

Using One hot Residue (OHR) in Image Processing: Proposed a Scheme of Filtering in Spatial Domain Research Journal of Applied Sciences, Engineering and Technology 4(23): 5063-5067, 2012 ISSN: 2040-7467 Maxwell Scientific Organization, 2012 Submitted: April 23, 2012 Accepted: April 06, 2012 Published:

More information

A SECURITY MODEL FOR ANONYMOUS CREDENTIAL SYSTEMS

A SECURITY MODEL FOR ANONYMOUS CREDENTIAL SYSTEMS A SECURITY MODEL FOR ANONYMOUS CREDENTIAL SYSTEMS Andreas Pashalidis* and Chris J. Mitchell Information Security Group, Royal Holloway, University of London { A.Pashalidis,C.Mitchell }@rhul.ac.uk Abstract

More information

The Use of Commercial Databases for National Security: Privacy, Evaluation, and Accuracy

The Use of Commercial Databases for National Security: Privacy, Evaluation, and Accuracy The Use of Commercial Databases for National Security: Privacy, Evaluation, and Accuracy Rebecca Wright Computer Science Department Stevens Institute of Technology www.cs.stevens.edu/~rwright National

More information

Strategic Roadmapping - Aligning technology, products and markets

Strategic Roadmapping - Aligning technology, products and markets Strategic Roadmapping - Aligning technology, products and markets Robert Phaal Centre for Technology Management 6 October 2011 Strategy and business performance The use of roadmaps is a weak area generally,

More information

Elements of Artificial Intelligence and Expert Systems

Elements of Artificial Intelligence and Expert Systems Elements of Artificial Intelligence and Expert Systems Master in Data Science for Economics, Business & Finance Nicola Basilico Dipartimento di Informatica Via Comelico 39/41-20135 Milano (MI) Ufficio

More information

4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016)

4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) 4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) Change laws of PHC contents in bottom waters in the bay mouth of Jiaozhou Bay Dongfang Yang1,2,3,a, Sixi Zhu1,2,

More information

Public Key Cryptography Great Ideas in Theoretical Computer Science Saarland University, Summer 2014

Public Key Cryptography Great Ideas in Theoretical Computer Science Saarland University, Summer 2014 7 Public Key Cryptography Great Ideas in Theoretical Computer Science Saarland University, Summer 2014 Cryptography studies techniques for secure communication in the presence of third parties. A typical

More information

THE NATIONAL INSTITUTE OF ENGINEERING, Mysore UG - Semester End Examination Schedule - December 2014

THE NATIONAL INSTITUTE OF ENGINEERING, Mysore UG - Semester End Examination Schedule - December 2014 5/12/2014 1 1 1 CV0413 Quantity Surveying & Estimation Computer Concept & C Programming CV0418/CV0501 Mechanics of Deformable Bodies CV0419/CV0201 Building Materials & Construction CV0420/CV0402 Mechanics

More information

Discrete Mathematics & Mathematical Reasoning Multiplicative Inverses and Some Cryptography

Discrete Mathematics & Mathematical Reasoning Multiplicative Inverses and Some Cryptography Discrete Mathematics & Mathematical Reasoning Multiplicative Inverses and Some Cryptography Colin Stirling Informatics Some slides based on ones by Myrto Arapinis Colin Stirling (Informatics) Discrete

More information

Using Reactive Deliberation for Real-Time Control of Soccer-Playing Robots

Using Reactive Deliberation for Real-Time Control of Soccer-Playing Robots Using Reactive Deliberation for Real-Time Control of Soccer-Playing Robots Yu Zhang and Alan K. Mackworth Department of Computer Science, University of British Columbia, Vancouver B.C. V6T 1Z4, Canada,

More information

Arlindo Oliveira. An Intellectual Property Strategy supporting Open Innovation

Arlindo Oliveira. An Intellectual Property Strategy supporting Open Innovation Arlindo Oliveira An Intellectual Property Strategy supporting Open Innovation The innovation process Why do we need open innovation? "The most successful organizations co-create products and services with

More information

BLer: A Boundary Labeller for Technical Drawings

BLer: A Boundary Labeller for Technical Drawings BLer: A Boundary Labeller for Technical Drawings Michael A. Bekos, Antonios Symvonis National Technical University of Athens School of Applied Mathematical & Physical Sciences 15780 Zografou, Athens, Greece

More information

computational social networks 5th pdf Computational Social Networks Home page Computational Social Networks SpringerLink

computational social networks 5th pdf Computational Social Networks Home page Computational Social Networks SpringerLink DOWNLOAD OR READ : COMPUTATIONAL SOCIAL NETWORKS 5TH INTERNATIONAL CONFERENCE CSONET 2016 HO CHI MINH CITY VIETNAM AUGUST 2 4 2016 PROCEEDINGS LECTURE NOTES IN COMPUTER SCIENCE PDF EBOOK EPUB MOBI Page

More information

EXECUTIVE SUMMARY. St. Louis Region Emerging Transportation Technology Strategic Plan. June East-West Gateway Council of Governments ICF

EXECUTIVE SUMMARY. St. Louis Region Emerging Transportation Technology Strategic Plan. June East-West Gateway Council of Governments ICF EXECUTIVE SUMMARY St. Louis Region Emerging Transportation Technology Strategic Plan June 2017 Prepared for East-West Gateway Council of Governments by ICF Introduction 1 ACKNOWLEDGEMENTS This document

More information

FUTURE-PROOF INTERFACES: SYSTEMATIC IDENTIFICATION AND ANALYSIS

FUTURE-PROOF INTERFACES: SYSTEMATIC IDENTIFICATION AND ANALYSIS 13 TH INTERNATIONAL DEPENDENCY AND STRUCTURE MODELLING CONFERENCE, DSM 11 CAMBRIDGE, MASSACHUSETTS, USA, SEPTEMBER 14 15, 2011 FUTURE-PROOF INTERFACES: SYSTEMATIC IDENTIFICATION AND ANALYSIS Wolfgang Bauer

More information

Problem Set 8 Solutions R Y G R R G

Problem Set 8 Solutions R Y G R R G 6.04/18.06J Mathematics for Computer Science April 5, 005 Srini Devadas and Eric Lehman Problem Set 8 Solutions Due: Monday, April 11 at 9 PM in oom 3-044 Problem 1. An electronic toy displays a 4 4 grid

More information

Introduction. digitalsupercluster.ca

Introduction. digitalsupercluster.ca Introduction digitalsupercluster.ca Government of Canada s Innovation Supercluster Initiative Federal government investing $950MM into superclusters to drive growth, prosperity, jobs and global leadership.

More information

An Optimal Algorithm for a Strategy Game

An Optimal Algorithm for a Strategy Game International Conference on Materials Engineering and Information Technology Applications (MEITA 2015) An Optimal Algorithm for a Strategy Game Daxin Zhu 1, a and Xiaodong Wang 2,b* 1 Quanzhou Normal University,

More information

THE ASSOCIATION OF MATHEMATICS TEACHERS OF NEW JERSEY 2018 ANNUAL WINTER CONFERENCE FOSTERING GROWTH MINDSETS IN EVERY MATH CLASSROOM

THE ASSOCIATION OF MATHEMATICS TEACHERS OF NEW JERSEY 2018 ANNUAL WINTER CONFERENCE FOSTERING GROWTH MINDSETS IN EVERY MATH CLASSROOM THE ASSOCIATION OF MATHEMATICS TEACHERS OF NEW JERSEY 2018 ANNUAL WINTER CONFERENCE FOSTERING GROWTH MINDSETS IN EVERY MATH CLASSROOM CREATING PRODUCTIVE LEARNING ENVIRONMENTS WEDNESDAY, FEBRUARY 7, 2018

More information

Lecture 32. Handout or Document Camera or Class Exercise. Which of the following is equal to [53] [5] 1 in Z 7? (Do not use a calculator.

Lecture 32. Handout or Document Camera or Class Exercise. Which of the following is equal to [53] [5] 1 in Z 7? (Do not use a calculator. Lecture 32 Instructor s Comments: This is a make up lecture. You can choose to cover many extra problems if you wish or head towards cryptography. I will probably include the square and multiply algorithm

More information

Dr Ioannis Bournakis

Dr Ioannis Bournakis Dr Ioannis Bournakis Current Position Lecturer in Economics Middlesex University Business School The Burroughs Hendon London NW4 4BT E-mail:I.Bournakis@mdx.ac.uk Telephone Number: 02084115349 Education

More information

Transactions Briefs. Sorter Based Permutation Units for Media-Enhanced Microprocessors

Transactions Briefs. Sorter Based Permutation Units for Media-Enhanced Microprocessors IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 15, NO. 6, JUNE 2007 711 Transactions Briefs Sorter Based Permutation Units for Media-Enhanced Microprocessors Giorgos Dimitrakopoulos,

More information

Berkeley Postdoc Entrepreneur Program (BPEP)

Berkeley Postdoc Entrepreneur Program (BPEP) Berkeley Postdoc Entrepreneur Program (BPEP) BPEP Mission: To foster entrepreneurship in the UC Berkeley postdoctoral and scientific community in order to move innovations from the laboratory to the marketplace.

More information

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key A Steganography Algorithm for Hiding Secret Message inside Image using Random Key Balvinder Singh Sahil Kataria Tarun Kumar Narpat Singh Shekhawat Abstract "Steganography is a Greek origin word which means

More information

A Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2

A Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2 A Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2 # Department of CSE, Bapatla Engineering College, Bapatla, AP, India *Department of CS&SE,

More information

Problem Set 8 Solutions R Y G R R G

Problem Set 8 Solutions R Y G R R G 6.04/18.06J Mathematics for Computer Science April 5, 005 Srini Devadas and Eric Lehman Problem Set 8 Solutions Due: Monday, April 11 at 9 PM in Room 3-044 Problem 1. An electronic toy displays a 4 4 grid

More information